Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE) | 2018年
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Anomaly Detection based on Eccentricity Analysis
    Angelov, Plamen
    2014 IEEE SYMPOSIUM ON EVOLVING AND AUTONOMOUS LEARNING SYSTEMS (EALS), 2014, : 1 - 8
  • [2] WK-FNN DESIGN FOR DETECTION OF ANOMALIES IN THE COMPUTER NETWORK TRAFFIC
    Protic, Danijela
    Stankovic, Miomir
    Antic, Vladimir
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2022, 35 (02) : 269 - 282
  • [3] Towards Automatic Detection and Diagnosis of Internet Service Anomalies via DNS Traffic Analysis
    Fiadino, Pierdomenico
    D'Alconzo, Alessandro
    Schiavone, Mirko
    Casas, Pedro
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 373 - 378
  • [4] On the Detection of Network Traffic Anomalies in Content Delivery Network Services
    Fiadino, Pierdomenico
    D'Alconzo, Alessandro
    Baer, Arian
    Finamore, Alessandro
    Casas, Pedro
    2014 26TH INTERNATIONAL TELETRAFFIC CONGRESS (ITC), 2014,
  • [5] Improvement the schemes and models of detecting network traffic anomalies on computer systems
    Yusupdjanovich, Yusupov Sabirjan
    Rajaboevich, Gulomov Sherzod
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [6] Network Traffic Anomaly Detection Based on Wavelet Analysis
    Du, Zhen
    Ma, Lipeng
    Li, Huakang
    Li, Qun
    Sun, Guozi
    Liu, Zichang
    2018 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATION (SERA), 2018, : 94 - 101
  • [7] Network Traffic Analysis based on Collective Anomaly Detection
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2014, : 1141 - 1146
  • [8] An information-theoretic method for the detection of anomalies in network traffic
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    COMPUTERS & SECURITY, 2017, 70 : 351 - 365
  • [9] Uncovering network traffic anomalies based on their sparse distributions
    GuoZhen Cheng
    HongChang Chen
    DongNian Cheng
    Zhen Zhang
    JuLong Lan
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [10] Uncovering network traffic anomalies based on their sparse distributions
    Cheng GuoZhen
    Chen HongChang
    Cheng DongNian
    Zhang Zhen
    Lan JuLong
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 11